IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management White Papers (View All Report Types)
1 - 25 of 1550 Matches Previous Page  |  Next Page
Security predictions for 2015
sponsored by Imperva
WHITE PAPER: With the insight of security experts and the help of analytics tools, this white paper presents five security predictions for the 2015 security landscape.
Posted: 27 Feb 2015 | Published: 31 Jan 2015

Imperva

[Security Identity Governance: Reduce Risk and Comply with Regulations
sponsored by IBM
WHITE PAPER: Access this white paper to discover how to effectively manage identities and application access while bringing together business operations and IT. Read on to learn how to bridge the gaps across compliance, and how this can reduce the risk of fraud, human error, and more.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

IBM

Global Threat Intelligence Report
sponsored by Dimension Data
WHITE PAPER: This in-depth white paper can help you discover the latest security threats and how to stop them.
Posted: 26 Feb 2015 | Published: 31 Dec 2014

Dimension Data

10 Ways Everyone Should Approach Cybersecurity in 2015
sponsored by Global Knowledge
WHITE PAPER: This paper reviews key security issues and focuses attention on 10 responses that we all need to adopt in our approach to security in 2015.
Posted: 25 Feb 2015 | Published: 25 Feb 2015

Global Knowledge

A Clear View into User Activities with Identity Intelligence
sponsored by IBM
WHITE PAPER: Access this white paper to learn about an identity intelligence platform that can help better manage and secure users as a key line of defense across infrastructure perimeters.  Additionally, view now to read several case stories of organizations who have had success with this identity intelligence platform.
Posted: 25 Feb 2015 | Published: 17 Sep 2014

IBM

The Next Generation of Fraud Detection
sponsored by IBM
WHITE PAPER: This white paper describes how system provides advanced fraud detection to combat more threats.
Posted: 24 Feb 2015 | Published: 30 Nov 2014

IBM

Get Inside the Thriving Malware Industry
sponsored by IBM
WHITE PAPER: This white paper helps you understand how a malware attack works by getting you inside the mind of a hacker.
Posted: 24 Feb 2015 | Published: 31 Jan 2014

IBM

Win the War on Cybercrime with Four Key Elements
sponsored by IBM
WHITE PAPER: The following white paper helps you stay ahead of cybercriminals by outlining the four key elements of fraud prevention.
Posted: 24 Feb 2015 | Published: 31 Dec 2013

IBM

Behavior-based Protection Strategies from the Network to Remote Endpoints.
sponsored by IBM
WHITE PAPER: This white paper looks at behavior-based protection, a comprehensive security system that fights the latest threats.
Posted: 24 Feb 2015 | Published: 31 Oct 2014

IBM

Survey Results: How Are Security Analytics Used?
sponsored by AlienVault
WHITE PAPER: This survey explores issues of security analytics and intelligence, revealing how IT security teams use those tools to detect cyber-attacks.
Posted: 23 Feb 2015 | Published: 31 Dec 2014

AlienVault

The Evolving Threat Landscape
sponsored by Threat Track Security
WHITE PAPER: The following white paper presents an interview with a leadinging expert on security technology on how cybercrime has evolved.
Posted: 20 Feb 2015 | Published: 31 Dec 2014

Threat Track Security

IBM X-Force Threat Intelligence Quarterly - 3Q 2014
sponsored by IBM
WHITE PAPER: This exclusive white paper takes a look at how Heartbleed impacted organizations around the world.
Posted: 20 Feb 2015 | Published: 31 Aug 2014

IBM

Mobility on hold: Get back on track with mobile risk mitigation
sponsored by IBM
WHITE PAPER: This white paper introduces one security system that keeps up with the risks of mobile banking.
Posted: 20 Feb 2015 | Published: 31 Dec 2013

IBM

Breaking Down Silos and Securing Directory Access
sponsored by IBM
WHITE PAPER: Access this white paper to learn strategies to breaking down directory siloes and how to manage and protect heterogeneous data sources.
Posted: 20 Feb 2015 | Published: 08 Oct 2014

IBM

Redefining Your Data Protection Strategy: Focus on Recovery
sponsored by Dell Software
WHITE PAPER: In this white paper, you will learn how purpose-built backup appliances (PBBAs) are becoming more popular and how they can help you protect data despite growing demands.
Posted: 20 Feb 2015 | Published: 04 Dec 2014

Dell Software

4 Reasons Not to Nuke an Infected Machine
sponsored by Threat Track Security
WHITE PAPER: In this white paper, uncover the 4 reasons not to wipe a PC touched by malware. Read on to learn about alternative strategies to save time, resources, and money.
Posted: 19 Feb 2015 | Published: 04 Feb 2015

Threat Track Security

The Cyber Security Defensive Strategy Playbook
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: Access this cyberthreat report that sheds light on the evolving nature of threats, the actors behind them, and the successful techniques they are utilizing. Read on now to get helpful tips on how to craft your defensive strategy.
Posted: 19 Feb 2015 | Published: 04 Dec 2014

ForeScout Technologies, Inc.

Application Whitelisting: Discover the Pros and Cons
sponsored by Threat Track Security
WHITE PAPER: This webpage explores the option of whitelisting, dissecting its pros and cons.
Posted: 18 Feb 2015 | Published: 04 Nov 2013

Threat Track Security

Predictions from the Front Lines for Cybersecurity in 2015
sponsored by Threat Track Security
WHITE PAPER: This white paper summarizes the results of a survey of security professionals, revealing what IT professionals are thinking and why in 2015.
Posted: 18 Feb 2015 | Published: 18 Feb 2015

Threat Track Security

The Security Value of a Dozen Next Generation Firewalls
sponsored by Cisco Systems, Inc.
WHITE PAPER: A security research group has put together an info-graphic that summarizes the results of independent studies on a dozen different NGFW products.
Posted: 18 Feb 2015 | Published: 30 Sep 2014

Cisco Systems, Inc.

Top 10 IoT Security Challenges
sponsored by Axway
WHITE PAPER: In this white paper, learn the top ten security considerations for IoT. Read on now and explore two IoT security scenario case studies and their respective solutions.
Posted: 18 Feb 2015 | Published: 04 Dec 2013

Axway

Optimizing Enterprise Security: Intelligence, Control, and Response
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: This white paper explores the factors that make network security management and operations more difficult today than ever before.
Posted: 17 Feb 2015 | Published: 28 Nov 2014

ForeScout Technologies, Inc.

Defending Against Rogue Users, Devices, and Applications
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: This white paper explains how NAC technologies help to ensure that only appropriate users, devices, and applications have access to your network resources, enabling you to support your users in a secure, efficient way.
Posted: 17 Feb 2015 | Published: 29 Aug 2014

ForeScout Technologies, Inc.

Cisco 2015 Annual Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: This report reveals up-to-date data on many of the most important security concerns facing organizations in 2015.
Posted: 16 Feb 2015 | Published: 01 Jan 2015

Cisco Systems, Inc.

The Impact of New Communications in the Energy Industry
sponsored by Actiance
WHITE PAPER: This white paper discusses the use of instant messaging technology in the energy industry, explaining why monitoring, logging, and archiving these communications is a necessity for achieving compliance and protecting critical assets from cyberattacks.
Posted: 16 Feb 2015 | Published: 30 May 2014

Actiance
1 - 25 of 1550 Matches Previous Page    1 2 3 4    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement